CVE-2022-48798

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-48798
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48798.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-48798
Downstream
Related
Published
2024-07-16T11:43:52Z
Modified
2025-10-14T20:14:28.689603Z
Summary
s390/cio: verify the driver availability for path_event call
Details

In the Linux kernel, the following vulnerability has been resolved:

s390/cio: verify the driver availability for path_event call

If no driver is attached to a device or the driver does not provide the pathevent function, an FCES path-event on this device could end up in a kernel-panic. Verify the driver availability before the pathevent function call.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
32ef938815c1fb42d65212aac860ab153a64de1a
Fixed
fe990b7bf6ac93f1d850d076b8f0e758268aa4ab
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
32ef938815c1fb42d65212aac860ab153a64de1a
Fixed
a0619027f11590b2070624297530c34dc7f91bcd
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
32ef938815c1fb42d65212aac860ab153a64de1a
Fixed
dd9cb842fa9d90653a9b48aba52f89c069f3bc50

Affected versions

v5.*

v5.10
v5.10-rc5
v5.10-rc6
v5.10-rc7
v5.11
v5.11-rc1
v5.11-rc2
v5.11-rc3
v5.11-rc4
v5.11-rc5
v5.11-rc6
v5.11-rc7
v5.12
v5.12-rc1
v5.12-rc1-dontuse
v5.12-rc2
v5.12-rc3
v5.12-rc4
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.15.1
v5.15.10
v5.15.11
v5.15.12
v5.15.13
v5.15.14
v5.15.15
v5.15.16
v5.15.17
v5.15.18
v5.15.19
v5.15.2
v5.15.20
v5.15.21
v5.15.22
v5.15.23
v5.15.3
v5.15.4
v5.15.5
v5.15.6
v5.15.7
v5.15.8
v5.15.9
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.16.1
v5.16.2
v5.16.3
v5.16.4
v5.16.5
v5.16.6
v5.16.7
v5.16.8
v5.16.9
v5.17-rc1
v5.17-rc2
v5.17-rc3

Database specific

{
    "vanir_signatures": [
        {
            "digest": {
                "line_hashes": [
                    "222875603311123311044425788857599160922",
                    "112402021772287244733231460507269274826",
                    "185260718245578545909918491303936204415",
                    "25829328305252532617617681542341501154"
                ],
                "threshold": 0.9
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dd9cb842fa9d90653a9b48aba52f89c069f3bc50",
            "signature_type": "Line",
            "target": {
                "file": "drivers/s390/cio/device.c"
            },
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2022-48798-0c183de7"
        },
        {
            "digest": {
                "length": 1106.0,
                "function_hash": "48284305125547998614805502482467141866"
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dd9cb842fa9d90653a9b48aba52f89c069f3bc50",
            "signature_type": "Function",
            "target": {
                "function": "io_subchannel_chp_event",
                "file": "drivers/s390/cio/device.c"
            },
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2022-48798-1122231b"
        },
        {
            "digest": {
                "length": 1106.0,
                "function_hash": "48284305125547998614805502482467141866"
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fe990b7bf6ac93f1d850d076b8f0e758268aa4ab",
            "signature_type": "Function",
            "target": {
                "function": "io_subchannel_chp_event",
                "file": "drivers/s390/cio/device.c"
            },
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2022-48798-4b79ceb0"
        },
        {
            "digest": {
                "line_hashes": [
                    "222875603311123311044425788857599160922",
                    "112402021772287244733231460507269274826",
                    "185260718245578545909918491303936204415",
                    "25829328305252532617617681542341501154"
                ],
                "threshold": 0.9
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a0619027f11590b2070624297530c34dc7f91bcd",
            "signature_type": "Line",
            "target": {
                "file": "drivers/s390/cio/device.c"
            },
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2022-48798-6555ab03"
        },
        {
            "digest": {
                "length": 1106.0,
                "function_hash": "48284305125547998614805502482467141866"
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a0619027f11590b2070624297530c34dc7f91bcd",
            "signature_type": "Function",
            "target": {
                "function": "io_subchannel_chp_event",
                "file": "drivers/s390/cio/device.c"
            },
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2022-48798-965b7864"
        },
        {
            "digest": {
                "line_hashes": [
                    "222875603311123311044425788857599160922",
                    "112402021772287244733231460507269274826",
                    "185260718245578545909918491303936204415",
                    "25829328305252532617617681542341501154"
                ],
                "threshold": 0.9
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fe990b7bf6ac93f1d850d076b8f0e758268aa4ab",
            "signature_type": "Line",
            "target": {
                "file": "drivers/s390/cio/device.c"
            },
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2022-48798-f42848e4"
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.24
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.10